Protect Your Data in the Elastic Stack

Elastic Stack security features give the right access to the right people. IT, operations, and application teams rely on them to manage well-intentioned users and keep malicious actors at bay, while executives and customers can rest easy knowing data stored in the Elastic Stack is safe and secure.

Security for Elasticsearch. Watch Video
New Segment and control access to groups of Canvas workpads, dashboards and visualizations in a multi-tenant fashion using Kibana Spaces. Learn More
AUTHENTICATION

Sign On, Securely

It's the first step to protect data flowing through Elasticsearch, Kibana, Beats, and Logstash from unauthorized users and unintentional modification.

With the Elastic Stack, you can integrate with a number of industry standard identity management systems. Authenticate with Active Directory, LDAP, or the Elasticsearch native realm. Use single sign-on (SSO) options like certificates, Kerberos, and SAML — or build a custom realm that supports your home-grown identity management system.

AUTHORIZATION

Manage Users and Roles

Take control of who can do what within the Elastic Stack. Grant the IT/Ops team the ability to monitor Elasticsearch cluster health without being able to see or modify the data. Or give the marketing team read-only access to marketing-specific data, but deny access to other indices. User privileges extend to Kibana, too. Group dashboards, visualizations, and saved searches into spaces by team, function, or any way you choose — and control who can access which space.

And with support for multitenancy, you can grant users access to specific Elasticsearch indices and Kibana spaces.

ENCRYPTION

Prevent Snooping, Tampering, and Sniffing

Protect data — credit card numbers, email addresses, accounts — as it travels within the cluster and clients.

With SSL/TLS encryption, you can secure node-to-node, HTTP, and transport client traffic across your Elastic Stack. IP filtering also prevents unapproved hosts from joining or communicating with your cluster.

LAYERED SECURITY

Secure All the Way Down to the Field Level

We dug deep to engineer and implement rock-solid security you can trust. Safeguard your Elastic Stack data at the level you like — from top to bottom.

  • Cluster
    CLUSTER
    Who can check cluster health?
  • Index
    INDEX
    Who can add or delete documents in an index?
  • Document
    DOCUMENT
    Who can access sensitive documents?
  • Field Lock
    FIELD
    Restrict access to individual fields.
AUDIT LOGGING

Have a Record of Who Did What and When

Perhaps the quiet hero of the security world, our audit log features let you easily maintain a complete record of all system and user activity. You can filter the activity to only log what you need or log all activity that takes place in the Elastic Stack. You can, of course, log the audit data back into Elasticsearch for easy searching and analyzing later.

COMPLIANCE

Meeting Security Standards

Whether it's compliance from our end (FIPS 140-2 and Section 508) or standards on your side (HIPAA, PCI DSS, FISMA, ISO, or GDPR), the security features of the Elastic Stack help you become and stay compliant.

Go Ahead, Protect Your Data.

Securing your Elastic Stack is easy — and it makes good sense.
(Plus, it's also available on Elastic Cloud.)

Get Started